Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft edge chromium vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2021-38669
Microsoft Edge (Chromium-based) Tampering Vulnerability
Microsoft Edge Chromium
Microsoft Edge
NA
CVE-2022-44708
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
Microsoft Edge Chromium
Microsoft Edge
NA
CVE-2022-4135
Heap buffer overflow in GPU in Google Chrome before 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Microsoft Edge
Microsoft Edge Chromium
6.8
CVSSv2
CVE-2021-30606
Chromium: CVE-2021-30606 Use after free in Blink
Microsoft Edge
Microsoft Edge Chromium
Fedoraproject Fedora 35
6.8
CVSSv2
CVE-2021-30623
Chromium: CVE-2021-30623 Use after free in Bookmarks
Fedoraproject Fedora 35
Microsoft Edge
Microsoft Edge Chromium
2 Github repositories
6.8
CVSSv2
CVE-2021-30609
Chromium: CVE-2021-30609 Use after free in Sign-In
Fedoraproject Fedora 35
Microsoft Edge
Microsoft Edge Chromium
6.8
CVSSv2
CVE-2021-30610
Chromium: CVE-2021-30610 Use after free in Extensions API
Fedoraproject Fedora 35
Microsoft Edge
Microsoft Edge Chromium
6.8
CVSSv2
CVE-2021-30611
Chromium: CVE-2021-30611 Use after free in WebRTC
Fedoraproject Fedora 35
Microsoft Edge
Microsoft Edge Chromium
4.3
CVSSv2
CVE-2021-30617
Chromium: CVE-2021-30617 Policy bypass in Blink
Fedoraproject Fedora 35
Microsoft Edge
Microsoft Edge Chromium
6.8
CVSSv2
CVE-2021-30618
Chromium: CVE-2021-30618 Inappropriate implementation in DevTools
Fedoraproject Fedora 35
Microsoft Edge
Microsoft Edge Chromium
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-38002
CVE-2006-4304
CVE-2024-4336
CVE-2024-33437
CVE-2024-4340
CVE-2024-27956
privilege
insecure direct object reference
XSS
item search icon">CVE-2024-25938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »